General

  • Target

    2025-04-03_fc291df0e188d1f70e2b85e62cb11c43_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

  • Size

    10.5MB

  • Sample

    250403-engcza1qz7

  • MD5

    fc291df0e188d1f70e2b85e62cb11c43

  • SHA1

    79e19b8d80a201b221185a6c33dab66266e59514

  • SHA256

    b30812a7e3c86517023d6db347fde0b69f01cd377cdd8321d312993122b25a39

  • SHA512

    29407fac14ab8f270e25a447973bee0fcd34f5c7267305137392dd8a79307388aa19e2046a2b0dbbf4adbb2ca888774dd2f39ee1ba3ae8df038a372b62769d69

  • SSDEEP

    196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPF:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0d

Malware Config

Targets

    • Target

      2025-04-03_fc291df0e188d1f70e2b85e62cb11c43_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader

    • Size

      10.5MB

    • MD5

      fc291df0e188d1f70e2b85e62cb11c43

    • SHA1

      79e19b8d80a201b221185a6c33dab66266e59514

    • SHA256

      b30812a7e3c86517023d6db347fde0b69f01cd377cdd8321d312993122b25a39

    • SHA512

      29407fac14ab8f270e25a447973bee0fcd34f5c7267305137392dd8a79307388aa19e2046a2b0dbbf4adbb2ca888774dd2f39ee1ba3ae8df038a372b62769d69

    • SSDEEP

      196608:K2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YgOFmknGzwHIPHd9DPF:KnEwl1CPwDv3uFY43v13uFnCPwa/VW0d

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Creates a Windows Service

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks